Cryptography for Developers (eBook)
400 Seiten
Elsevier Science (Verlag)
978-0-08-050345-5 (ISBN)
The book begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes in-depth discussion on memory/size/speed performance trade-offs as well as what cryptographic problems are solved with the specific topics at hand.
* The author is the developer of the industry standard cryptographic suite of tools called LibTom
* A regular expert speaker at industry conferences and events on this development
* The book has a companion Web site with over 300-pages of text on implementing multiple precision arithmetic
The only guide for software developers who must learn and implement cryptography safely and cost effectively.Cryptography for Developers begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes in-depth discussion on memory/size/speed performance trade-offs as well as what cryptographic problems are solved with the specific topics at hand. - The author is the developer of the industry standard cryptographic suite of tools called LibTom- A regular expert speaker at industry conferences and events on this development
Front Cover 1
Cryptography for Developers 4
Copyright Page 5
Contents 10
Preface 20
Chapter 1. Introduction 24
Introduction 25
Threat Models 26
What Is Cryptography? 27
Asset Management 34
Common Wisdom 36
Developer Tools 38
Summary 39
Organization 39
Frequently Asked Questions 41
Chapter 2. ASN.1 Encoding 44
Overview of ASN.1 45
ASN.1 Syntax 46
ASN.1 Data Types 51
ASN.1 Length Encodings 54
ASN. 1 Boolean Type 55
ASN.1 Integer Type 56
ASN.1 BIT STRING Type 57
ASN.1 OCTET STRING Type 58
ASN.1 NULL Type 58
ASN.1 OBJECT IDENTIFIER Type 59
ASN.1 SEQUENCE and SET Types 60
ASN.1 PrintableString and IA5STRING Types 64
ASN.1 UTCTIME Type 64
Iniplementation 65
ASN.1 Length Routines 65
ASN.1 Primitive Encoders 68
Putting It All Together 106
Frequently Asked Questions 113
Chapter 3. Random Number Generation 114
Introduction 115
Measuring Entropy 117
How Bad Can It Be? 121
RNG Design 121
PRNG Algorithms 138
Putting It All Together 154
Frequently Asked Questions 159
Chapter 4. Advanced Encryption Standard 162
Introduction 163
Implementation 179
Practical Attacks 204
Chaining Modes 209
Putting It All Together 216
Frequently Asked Questions 223
Chapter 5. Hash Functions 226
Introduction 227
Designs of SHS and Implementation 230
PKCS # 5 Key Derivation 259
Putting It All Together 261
Frequently Asked Questions 271
Chapter 6. Message-Authentication Code Algorithms 274
Introduction 275
Security Guidelines 276
Standards 277
Cipher Message Authentication Code 278
Hash Message Authentication Code 290
Putting It All Together 298
Frequently Asked Questions 316
Chapter 7. Encrypt and Authenticate Modes 320
Introduction 321
Design and Implementation 322
Putting It All Together 361
Frequently Asked Questions 369
Chapter 8. Large Integer Arithmetic 372
Introduction 373
What Are BigNums? 373
The Algorithms 374
Putting It All Together 397
Frequently Asked Questions 401
Chapter 9. Public Key Algorithms 402
Introduction 403
Goals of Public Key Cryptography 403
RSA Public Key Cryptography 405
Elliptic Curve Cryptography 414
Putting It All Together 425
Frequently Asked Questions 429
Index 432
Erscheint lt. Verlag | 1.12.2007 |
---|---|
Sprache | englisch |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Kryptologie | |
Wirtschaft ► Betriebswirtschaft / Management | |
ISBN-10 | 0-08-050345-4 / 0080503454 |
ISBN-13 | 978-0-08-050345-5 / 9780080503455 |
Haben Sie eine Frage zum Produkt? |
Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine
Geräteliste und zusätzliche Hinweise
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich